Besides the ID_STAR selection, you might also look at the GLOBAL, UACC and WARNING checkboxes. Together, these help you find unspecific access paths.
You will also want to play with the Output/run options, in particular the "Summary by member class and profile" will draw your attention to the profiles, whereas the default "Summary by user id" identifies the ... well... users first.
At the end of the detail display (keep hitting S in front of the summary lines) you will see how zSecure determined the access path by comparing access list entries of the profile with connect group entries of the user that accessed the resource:
Current RACF database effect RACF return code current DB 0 Authority used in current DB ID_STAR Grp permit used in current DB RACF Profile type current DB GENERIC RACF class and profile in DB DATASET CATALOG.DEV Installation data Creation/definition date 13 Jun 2018You might also be interested in options AM.9.4 + 5. These generate a group (if you want), CONNECT and PERMIT commands to grant access to the users that currently gain access through UACC and ID(*). You want to use selection on CLASS, RESOURCE mask and INTENT to use different group names.